Special Offers | My Account | Log In
  0 items in your cart


Search: Boson Sites | Products
EC-Council > CHFI > CHFI Training

Upcoming Dates:

Don’t see the date you want? Contact us.
Price: $2895

Call 813-925-0700 (opt 2) to request this class.

CHFI Training

Class Delivery Methods
Request a private class

Contact Us:

813-925-0700 (opt 2)
877-333-EXAM (opt 2)
FAX: 813-925-3957
EMAIL: Boson Training

Full Course List

Request More Information


CHFI Training

About This IT Training:

Exam Number: 312-49
Exam Name: Computer Hacking Forensic Investigator Training
Certifications: CHFI

CHFI v8.0 (Computer Hacking Forensic Investigator) Training

This five-day course presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience with various forensic investigation techniques and with the standard tools necessary to successfully carry out a computer forensic investigation.

What’s Included

  • Comprehensive study materials and official EC-Council courseware

CHFI v8.0 Training Prerequisites

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.

CHFI v8.0 Training Course Outline

  • Module 01: Computer Forensics in Today’s World
  • Module 02: Computer Forensics Investigation Process
  • Module 03: Searching and Seizing Computers
  • Module 04: Digital Evidence
  • Module 05: First Responder Procedures
  • Module 06: Computer Forensics Lab
  • Module 07: Understanding Hard Disks and File Systems
  • Module 08: Windows Forensics
  • Module 09: Data Acquisition and Duplication
  • Module 10: Recovering Deleted Files and Deleted Partitions
  • Module 11: Forensics Investigation Using AccessData FTK
  • Module 12: Forensics Investigation Using EnCase
  • Module 13: Steganography and Image File Forensics
  • Module 14: Application Password Crackers
  • Module 15: Log Capturing and Event Correlation
  • Module 16: Network Forensics, Investigating Logs and Investigating Network Traffic
  • Module 17: Investigating Wireless Attacks
  • Module 18: Investigating Web Attacks
  • Module 19: Tracking Emails and Investigating Email Crimes
  • Module 20: Mobile Forensics
  • Module 21: Investigative Reports
  • Module 22: Becoming an Expert Witness



Be the first to review this product. If you have used this product, you can review it on your account page. You must be logged in to review products.


ECC-TR-31249-01